GEOGRAPHIC DATA AND STEGANOGRAPHY - Using Google Earth and KML Files for High-Capacity Steganography

Malte Diehl

2008

Abstract

Steganography is the art of hiding the existence of information, whereas cryptography only aims at hiding the content of a message. Most steganographic algorithms try to embed data into images, audio or video files that provide reasonable capacities. However, such systems are often vulnerable to simple statistical attacks. In this paper, in order to provide an appropriate alternative to the currently used algorithms, we examine the information hiding properties of vector data that is used by many geographic information systems in great quantities. Unlike watermarking, we focus on maximising embedding capacities rather than on robustness, while still providing security against statistical attacks. Our implementation that uses the KML format known from Google Earth and other map services can replace more than 20 % of the original data with hidden messages, provided that a lot of numerical geodata is present in the KML file. Thus, our algorithm can hide about twice as much as current algorithms for images. Yet, virtually no distortions are inflicted to the cover data.

References

  1. Bazin, C., Le Bars, J.-M., and Madelaine, J. (2007). A Blind, Fast and Robust Method for Geographical Data Watermarking. In Proceedings on the 2nd ACM symposium on Information, Computer and Communications Security, pages 265-272, Singapore.
  2. Benford, F. (1938). The Law of Anomalous Numbers. In Proceedings of the American Philosophical Society, number 78, pages 551-572.
  3. Böhme, R. and Westfeld, A. (2004). Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics. In Samarati, P., Ryan, P., Gollmann, D., and Molva, R., editors, Computer Security ESORICS 2004. 9th European Symposium on Research in Computer Security, volume 3193 of LNCS, pages 125-140.
  4. Cox, A., editor (1999). Allen's Astrophysical Quantities. Springer-Verlag, 4th edition.
  5. Doncel, V. R., Nikolaidis, N., and Pitas, I. (2005). Watermarking Polygonal Lines Using an Optimal Detector on the Fourier Descriptors Domain. In Proceedings of 2005 EURASIP European Signal Processing Conference, Antalya, Turkey.
  6. Fridrich, J., Goljan, M., and Soukal, D. (2004). Perturbed Quantization Steganography with Wet Paper Codes. In Proc. ACM Multimedia Security Workshop, pages 4-15, Magdeburg, Germany.
  7. Fridrich, J., Pevny, T., and Kodovsky, J. (2007). Statistically Undetectable JPEG Steganography: Dead Ends, Challenges, and Opportunities. In Proceedings of the ACM MM&S Workshop, pages 3-14, Dallas, USA.
  8. Katzenbeisser, S. and Petitcolas, F., editors (2000). Information Hiding. Techniques for Steganography and Digital Watermarking. Artech House.
  9. Open Geospatial Consortium Inc. (2007). KML 2.2 An OGC Best Practice. Technical report.
  10. Provos, N. (2001). Defending Against Statistical Steganalysis. In Proceedings 10th USENIX Security Symposium, Washington, USA.
  11. Sallee, P. (2004). Model-based Steganography. In Proceedings of International Workshop on Digital Watermarking, volume 2939, pages 154-167.
  12. Wang, K., Lavou, G., Denis, F., and Baskurt, A. (2007). Hierarchical Blind Watermarking of 3D Triangular Meshes. In Proceedings of the IEEE International Conference on Multimedia & Expo, pages 1235-1238, Beijing, China.
  13. Westfeld, A. (2001). F5 - A Steganographic Algorithm: High Capacity Despite Better Steganalysis. In Moskowitz, I. S., editor, Information Hiding. 4th International Workshop, IH'01, pages 289-302.
Download


Paper Citation


in Harvard Style

Diehl M. (2008). GEOGRAPHIC DATA AND STEGANOGRAPHY - Using Google Earth and KML Files for High-Capacity Steganography . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 381-387. DOI: 10.5220/0001919003810387


in Bibtex Style

@conference{secrypt08,
author={Malte Diehl},
title={GEOGRAPHIC DATA AND STEGANOGRAPHY - Using Google Earth and KML Files for High-Capacity Steganography},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={381-387},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001919003810387},
isbn={978-989-8111-59-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - GEOGRAPHIC DATA AND STEGANOGRAPHY - Using Google Earth and KML Files for High-Capacity Steganography
SN - 978-989-8111-59-3
AU - Diehl M.
PY - 2008
SP - 381
EP - 387
DO - 10.5220/0001919003810387